{"id":206,"date":"2006-05-23T08:15:20","date_gmt":"2006-05-23T08:15:20","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/05\/ohio-university-compromised-for-over-a-year\/"},"modified":"2015-09-09T19:43:56","modified_gmt":"2015-09-09T11:43:56","slug":"ohio-university-compromised-for-over-a-year","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/05\/ohio-university-compromised-for-over-a-year\/","title":{"rendered":"Ohio University Compromised for Over a Year!"},"content":{"rendered":"

[ad]<\/p>\n

A year? A whole year? A few days I can take, but surely if an Admin doesn’t know what’s going with his machines for a year….compromised for a year, there is something wrong.<\/p>\n

An unprecedented string of electronic intrusions has prompted Ohio University to place at least one technician on paid administrative leave and begin a sweeping reorganization of the university’s computer services department.<\/p>\n

Bill Sams, Ohio University’s chief information officer, said he initiated the reorganization on Friday. The Athens, Ohio-based university is reacting to recent discoveries that data thieves compromised at least three campus computer servers.<\/p>\n

In a disclosure that hasn’t been widely reported, one of the compromised servers, which held Social Security numbers belonging to 137,000 people, was penetrated by U.S. and overseas-based hackers for at least a year and possibly much longer, Sams said in a phone interview Sunday with CNET News.com. <\/p><\/blockquote>\n

Pretty bad right? Universities should be on high alert after the previous incidents..<\/p>\n

At least one security expert was astonished that a compromise could go undetected for so long.<\/p>\n

“That’s unbelievable,” said Avivah Litan, security analyst with research firm Gartner. “I have never heard of that much of a delay. Why would it take a year to discover this? It doesn’t make any sense.”<\/p>\n

What’s also alarming to Litan is that a year-long compromise could go undetected at a time when universities should be operating on high alert. Over the past year, numerous media reports have chronicled security breaches at such schools as Notre Dame, Purdue and Georgetown universities. <\/p><\/blockquote>\n

It is a problem for universities though, they usually have budgets problems and have to make do with Open Source solutions (which is fine if you have skilled people), setup by untrained people, who learn on the fly.<\/p>\n

Then they have underpaid, overworked sys-admins, what do they expect? Plus it’s an educational facility, so they have to keep the knowledge free.<\/p>\n

Pretty tough situation.<\/p>\n

Ohio got screwed this time though, and it got out into the public domain.<\/p>\n

The culprits who broke into the other two servers made off with health records belonging to students treated at the university’s health center, as well as Social Security numbers of an additional 60,000 people.<\/p>\n

“We had a failure of both policies and procedures,” Sams said. Asked why, when so many schools were succumbing to computer attacks, Ohio University wasn’t quicker to order a security audit, Sams replied: “Should we have? Yes. Did we? No.” <\/p><\/blockquote>\n

Let’s hope the others learn some lessons.<\/p>\n

<\/p>\n

Source: News.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

[ad] A year? A whole year? A few days I can take, but surely if an Admin doesn’t know what’s going with his machines for a year….compromised for a year, there is something wrong. An unprecedented string of electronic intrusions has prompted Ohio University to place at least one technician on paid administrative leave and […]<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[38,37,215],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Darknet","author_link":"https:\/\/www.darknet.org.uk\/author\/darknet\/"},"_links":{"self":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/206"}],"collection":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":0,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/206\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/media?parent=206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/categories?post=206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/tags?post=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}